Chapter 17
Information Flow
BOTTOM: Masters, I am to discourse wonders: but ask me not what; for if I tell you, I am no true Athenian. I will tell you every thing, right as it fell out.
— A Midsummer Night’s Dream, IV, ii, 30–33.
Although access controls can constrain the rights of a user, they cannot constrain the flow of information through a system. In particular, when a system has a security policy regulating information flow, the system must ensure that the information flows do not violate the constraints of the policy. Both compile-time mechanisms and runtime mechanisms support the checking of information flows. Several systems implementing these mechanisms demonstrate their effectiveness.
17.1 Basics and Background
Information flow ...
Get Computer Security Art and Science, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.